A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security.
Debasis GiriP. D. SrivastavaPublished in: Int. J. Netw. Secur. (2008)
Keyphrases
- access control
- security model
- security policies
- data security
- dynamic access control
- fine grained
- security requirements
- security mechanisms
- role based access control
- security architecture
- security enforcement
- database security
- protection schemes
- access control models
- rbac model
- identity management
- access control policies
- policy enforcement
- unauthorized access
- access control mechanism
- role assignment
- security management
- privacy aware
- data protection
- access control systems
- role based access control model
- security analysis
- data management